β Serious XSS flaw discovered in Evernote for Windows, update now! β
π Read
via "Naked Security".
Online-note-sharing company Evernote has patched a hole that allowed attackers to infect notes shared via its service.π Read
via "Naked Security".
Naked Security
Serious XSS flaw discovered in Evernote for Windows, update now!
Online-note-sharing company Evernote has patched a hole that allowed attackers to infect notes shared via its service.
β Voting machine manual tells officials to reuse weak passwords β
π Read
via "Naked Security".
The manual turns good advice on its head, telling officials to use, reuse and recycle weak passwords.π Read
via "Naked Security".
Naked Security
Voting machine manual tells officials to reuse weak passwords
The manual turns good advice on its head, telling officials to use, reuse and recycle weak passwords.
π Top 20 application vulnerabilities in the enterprise are dominated by Adobe and Microsoft π
π Read
via "Security on TechRepublic".
Among the 20 application vulnerabilities, half were for Adobe Flash and 20% were by Microsoft Office.π Read
via "Security on TechRepublic".
π Why you should use a password manager π
π Read
via "Security on TechRepublic".
Jack Wallen discusses why everyone should use a password manager.π Read
via "Security on TechRepublic".
TechRepublic
Why you should use a password manager
Jack Wallen discusses why everyone should use a password manager.
π΄ 20 Cybersecurity Firms to Watch π΄
π Read
via "Dark Reading: ".
A look at some of the more interesting investments, acquisitions, and strategic moves in the security sector over the past year.π Read
via "Dark Reading: ".
Dark Reading
20 Cybersecurity Firms to Watch
A look at some of the more interesting investments, acquisitions, and strategic moves in the security sector over the past year.
π΄ 5 Reasons Why Threat Intelligence Doesn't Work π΄
π Read
via "Dark Reading: ".
Cybersecurity folks often struggle to get threat intelligence's benefits. Fortunately, there are ways to overcome these problems.π Read
via "Dark Reading: ".
Darkreading
5 Reasons Why Threat Intelligence Doesn't Work
Cybersecurity folks often struggle to get threat intelligence's benefits. Fortunately, there are ways to overcome these problems.
π Consumers are more concerned with cybersecurity and data privacy in 2018 π
π Read
via "Security on TechRepublic".
The majority of users would stop interacting with a brand after a breach.π Read
via "Security on TechRepublic".
TechRepublic
Consumers are more concerned with cybersecurity and data privacy in 2018
The majority of users would stop interacting with a brand after a breach.
β Rapidly Growing Router Botnet Takes Advantage of 5-Year-Old Flaw β
π Read
via "The first stop for security news | Threatpost ".
A sophisticated proxy code has infected hundreds of thousands of devices already.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Rapidly Growing Router Botnet Takes Advantage of 5-Year-Old Flaw
A sophisticated proxy code has infected hundreds of thousands of devices already.
β WordPress Flaw Opens Millions of WooCommerce Shops to Takeover β
π Read
via "The first stop for security news | Threatpost ".
A file delete vulnerability in WordPress can be elevated into a remote code execution vulnerability for plugins like WooCommerce.π Read
via "The first stop for security news | Threatpost ".
Threat Post
WordPress Flaw Opens Millions of WooCommerce Shops to Takeover
A file delete vulnerability in WordPress can be elevated into a remote code execution vulnerability for plugins like WooCommerce.
π΄ Utah Hacker Pleads Guilty to DoS Attacks: DoJ π΄
π Read
via "Dark Reading: ".
Online gaming companies, including Sony Online Entertainment, and servers were main targets.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
🕳 November Event Spotlight: CISO / CPO GDPR Summits, GDPR Workshops, 43rd Annual IP Institute, GBI CIO Event, Data Protection World Forum, EDAA Summit, IAPP Europe Data Protection Congress, Privacy Insight Series Webinar 🕳
<code>Media</code><code>CISO / CPO GDPR Summits
November
Seattle</code><code>The GDPR fundamentally changed the data privacy landscape, but that was clearly just the beginning.?The recently approved California Consumer Privacy Act firmly plants similar rights in the US market, and other global regulations demonstrate that we are in a new era of data privacy.? Itβs time for a paradigm shift in our approach to data ownership and rights.</code><code>This series is part of a special education / networking series in which TrustrArc is partnering with Intel, Microsoft, BDO, and GDPR Edge to bring to 20 locations across the US and EU. The Summits will bring together a wide range of expertise and industry perspectives from practitioners, the participating partners, and other special guests to discuss emerging trends on data privacy management.</code><code>>Reserve your seat to a November CISO / CPO GDPR Summit today</code><code>_____________________________________________________________________________</code><code>GDPR Privacy Management Workshops
November
Boston, Washington DC, Seattle & New York</code><code>The TrustArc Privacy Workshops are designed to help businesses achieve, demonstrate, and manage ongoing compliance for the EU GDPR and other regulations and frameworks, including Privacy Shield and CCPA. The free workshops provide informative guidance, peer discussions, and practical solutions on how to operationalize privacy program management along with examples of how companies are using privacy technology tools to help automate compliance.</code><code>The U.S. Department of Commerce will be joining as presenters for Workshops in Boston, Washington DC and New York.</code><code>Topics to be covered in the workshops include: Data Mapping, Records of Processing, DPIA / PIA Management, International Data Transfer, Individual Rights / Data Subjects Access Rights Management, Consent Management, and Compliance Reporting.
</code><code>>Request a seat here</code><code>_____________________________________________________________________________</code><code>43rd Annual IP Institute: Creativity and Innovation in the Arts and Sciences
November 7 β November 9
San Jose, CA</code><code>This yearβs multi-day IP Institute celebrates the diversity of IP in our lives and culture by offering outstanding educational programming as well as multiple fun networking events. This yearβs Institute provides a wide range of speakers and presentations on patent, copyright, trademark, trade secret, internet and privacy, cybercrime, technology transfer, licensing, music and entertainment, IP specific ethics, and more.</code><code>TrustArc Senior Counsel Darren Abernethy will be speaking on βGDPR: Lessons Learned From the Front Lineβ on Thursday, November 8th at 10:05am.</code><code>>Learn more here</code><code>_____________________________________________________________________________</code><code>GBI CIO Event
November 15
London</code><code>The CIO Event brings together technology leaders from across the public, large enterprises & mid-market sectors and will provide you with a strategic and practical toolkit to help drive transformation including CIOβs discussing the latest industry trends, workshops, panel discussions & Round table sessions led by visionaries within technology, first-hand case studies on the challenges facing IT andantastic networking opportunities with peers throughout the day.</code><code>TrustArc & GDPR Edge are sponsors and will be speaking at this event.</code><code>>Learn more here</code><code>_____________________________________________________________________________</code><code>Data Protection World Forum
November 20 β November 21
London</code><code>In an increasingly digital economy theβ¦
<code>Media</code><code>CISO / CPO GDPR Summits
November
Seattle</code><code>The GDPR fundamentally changed the data privacy landscape, but that was clearly just the beginning.?The recently approved California Consumer Privacy Act firmly plants similar rights in the US market, and other global regulations demonstrate that we are in a new era of data privacy.? Itβs time for a paradigm shift in our approach to data ownership and rights.</code><code>This series is part of a special education / networking series in which TrustrArc is partnering with Intel, Microsoft, BDO, and GDPR Edge to bring to 20 locations across the US and EU. The Summits will bring together a wide range of expertise and industry perspectives from practitioners, the participating partners, and other special guests to discuss emerging trends on data privacy management.</code><code>>Reserve your seat to a November CISO / CPO GDPR Summit today</code><code>_____________________________________________________________________________</code><code>GDPR Privacy Management Workshops
November
Boston, Washington DC, Seattle & New York</code><code>The TrustArc Privacy Workshops are designed to help businesses achieve, demonstrate, and manage ongoing compliance for the EU GDPR and other regulations and frameworks, including Privacy Shield and CCPA. The free workshops provide informative guidance, peer discussions, and practical solutions on how to operationalize privacy program management along with examples of how companies are using privacy technology tools to help automate compliance.</code><code>The U.S. Department of Commerce will be joining as presenters for Workshops in Boston, Washington DC and New York.</code><code>Topics to be covered in the workshops include: Data Mapping, Records of Processing, DPIA / PIA Management, International Data Transfer, Individual Rights / Data Subjects Access Rights Management, Consent Management, and Compliance Reporting.
</code><code>>Request a seat here</code><code>_____________________________________________________________________________</code><code>43rd Annual IP Institute: Creativity and Innovation in the Arts and Sciences
November 7 β November 9
San Jose, CA</code><code>This yearβs multi-day IP Institute celebrates the diversity of IP in our lives and culture by offering outstanding educational programming as well as multiple fun networking events. This yearβs Institute provides a wide range of speakers and presentations on patent, copyright, trademark, trade secret, internet and privacy, cybercrime, technology transfer, licensing, music and entertainment, IP specific ethics, and more.</code><code>TrustArc Senior Counsel Darren Abernethy will be speaking on βGDPR: Lessons Learned From the Front Lineβ on Thursday, November 8th at 10:05am.</code><code>>Learn more here</code><code>_____________________________________________________________________________</code><code>GBI CIO Event
November 15
London</code><code>The CIO Event brings together technology leaders from across the public, large enterprises & mid-market sectors and will provide you with a strategic and practical toolkit to help drive transformation including CIOβs discussing the latest industry trends, workshops, panel discussions & Round table sessions led by visionaries within technology, first-hand case studies on the challenges facing IT andantastic networking opportunities with peers throughout the day.</code><code>TrustArc & GDPR Edge are sponsors and will be speaking at this event.</code><code>>Learn more here</code><code>_____________________________________________________________________________</code><code>Data Protection World Forum
November 20 β November 21
London</code><code>In an increasingly digital economy theβ¦
π΄ Why Password Management and Company Security Strategies Fall Short π΄
π Read
via "Dark Reading: ".
Researchers say companies need to rethink their password training and take a more holistic approach to security.π Read
via "Dark Reading: ".
Dark Reading
Why Password Management and Company Security Strategies Fall Short
Researchers say companies need to rethink their password training and take a more holistic approach to security.
π How to enable SSL and TLS 1.3 on NGINX π
π Read
via "Security on TechRepublic".
Jack Wallen walks you through the steps for enabling SSL and TLS 1.3 on your NGINX websites.π Read
via "Security on TechRepublic".
TechRepublic
How to enable SSL and TLS 1.3 on NGINX
Jack Wallen walks you through the steps for enabling SSL and TLS 1.3 on your NGINX websites.
β Program Looks to Tap Military Vets for Cyber-Jobs β
π Read
via "The first stop for security news | Threatpost ".
The training and job-matching effort is a public-private partnership to address a growing workforce gap.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Program Looks to Tap Military Vets for Cyber-Jobs
The training and job-matching effort is a public-private partnership to address a growing workforce gap.
β Program Looks to Tap Military Vets for Cyber-Jobs β
π Read
via "The first stop for security news | Threatpost ".
The training and job-matching effort is a public-private partnership to address a growing workforce gap.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Program Looks to Tap Military Vets for Cyber-Jobs
The training and job-matching effort is a public-private partnership to address a growing workforce gap.
π΄ IT-to-OT Solutions That Can Bolster Security in the IIoT π΄
π Read
via "Dark Reading: ".
Industrial companies can use the hard-won, long-fought lessons of IT to leapfrog to an advanced state of Industrial Internet of Things security.π Read
via "Dark Reading: ".
Darkreading
IT-to-OT Solutions That Can Bolster Security in the IIoT
Industrial companies can use the hard-won, long-fought lessons of IT to leapfrog to an advanced state of Industrial Internet of Things security.
π How to make good business decisions about the spectrum of cyberthreats π
π Read
via "Security on TechRepublic".
Ray Rothrock, CEO of cyber-defense firm RedSeal, explains how to weigh each threat and respond appropriately.π Read
via "Security on TechRepublic".
TechRepublic
How to make good business decisions about the spectrum of cyberthreats
Ray Rothrock, CEO of cyber-defense firm RedSeal, explains how to weigh each threat and respond appropriately.
π΄ Checkmarx Acquires Custodela π΄
π Read
via "Dark Reading: ".
The purchase adds DevSecOps capabilities to a software license compliance platform.π Read
via "Dark Reading: ".
Dark Reading
Checkmarx Acquires Custodela
The purchase adds DevSecOps capabilities to a software license compliance platform.
π΄ Crytpocurrency Exchange Targeted Via Attack on Web Traffic Analysis Firm π΄
π Read
via "Dark Reading: ".
"Island-hopping" attackers breached StatCounter so they could get to users of gate.io.π Read
via "Dark Reading: ".
Dark Reading
Crytpocurrency Exchange Targeted Via Attack on Web Traffic Analysis Firm
Island-hopping attackers breached StatCounter so they could get to users of gate.io.
π΄ Finding Gold in the Threat Intelligence Rush π΄
π Read
via "Dark Reading: ".
Researchers sift through millions of threat intel observations to determine where to best find valuable threat data.π Read
via "Dark Reading: ".
Dark Reading
Finding Gold in the Threat Intelligence Rush
Researchers sift through millions of threat intel observations to determine where to best find valuable threat data.